|Publication number||US20030210802 A1|
|Application number||US 10/370,175|
|Publication date||Nov 13, 2003|
|Filing date||Feb 19, 2003|
|Priority date||Feb 22, 2002|
|Also published as||US7206431, US7474761, US20070127772|
|Publication number||10370175, 370175, US 2003/0210802 A1, US 2003/210802 A1, US 20030210802 A1, US 20030210802A1, US 2003210802 A1, US 2003210802A1, US-A1-20030210802, US-A1-2003210802, US2003/0210802A1, US2003/210802A1, US20030210802 A1, US20030210802A1, US2003210802 A1, US2003210802A1|
|Original Assignee||Frederick Schuessler|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (5), Referenced by (33), Classifications (13), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
 This application claims the benefit of U.S. Provisional Patent Application Serial No. 60/358,848 filed Feb. 22, 2002 and entitled “Secure Association of Photographs with Digital Information”. This application is expressly incorporated herein, in its entirety, by reference.
 Recently, there has been resurgence of interest in creating the next generation of identification (“ID”) cards that provide greater security then previously issued ID cards. The new ID cards are expected to provide at least the following two features with a high degree of reliability. First, the ID card must be associated with a person who carries the ID card by providing some verifiable biometric values. Second, there must be an easy way to detect counterfeit or altered ID cards.
 One approach is to have a photo on the ID card that may be verified as authentic. There are several existing technologies that attempt to address this issue. One technology allows for the digital watermarking of the photo by artificially altering predetermined portions of the photo. The photo is then verified by detecting the existence of the digital watermark. The digital watermarking technology, however, has a disadvantage that a substituted photo with the same watermarking cannot be detected.
 Another existing technology is utilization of a photo verification database. However, this technology is costly because it requires specialized verification equipment and a communication channel to the photo verification database. Furthermore, this technology relies on the database being available for a verification procedure at any given time.
 There is, therefore, a need for an ID card system that allows for the detection of an alerted photo. At the same, the system should be independent of a database (e.g., self-verifying). Furthermore, the system should be one that may be implemented with relatively inexpensive hardware, and require only a small amount of data to be stored on the ID card. The system should also be robust enough to work despite variations in a verification device's performance and wear and tear on the ID card.
 The present invention relates to a system and method for verifying a self-authenticating document. First, an image is obtained of at least a predetermined portion of the document. Then, the image is divided into a predetermined number of pixel groups, each pixel group including a plurality of pixels and pixel characteristic data for each pixel is determined. A pixel group classification data for each pixel group is determined as a function of the pixel characteristics data. Based on the pixel group classification data and a location of the corresponding pixel group in the image, a characteristic digital data “CDD” for the image is generated. The CDD is added to the document.
 Upon a request for verification of the document, the CDD is extracted from the document. Then, a further CDD based on the image is generated. The document is verified only if the CDD is substantially identical to the further CDD.
FIG. 1 shows an exemplary system according to the present invention;
FIG. 2 shows an exemplary embodiment of an identification card according to the present invention;
FIG. 3a shows an exemplary embodiment of a photo split into pixel groups;
FIG. 3b shows an exemplary embodiment of a pixel group;
FIG. 3c shows Table A illustrating an exemplary classification scheme for the pixel groups;
FIG. 4 shows an exemplary embodiment of a method for generating characteristic digital data according to the present invention;
FIG. 5 shows an exemplary embodiment of a method for issuing the identification card; and
FIG. 6 shows an exemplary embodiment of a method for verifying a customer using the identification card.
 The present invention relates to a system and method for generating and verifying a self-authenticating document, and in particular, an identification card. FIG. 1 shows an exemplary system 1 according to the present invention. The system 1 may include an issuer 2, a cardholder 4 and a user 6. The issuer 2 may be an entity that performs a background check verification procedure to confirm the identity of the cardholder 4 and issues an identification (“ID”) card 8 (shown in FIG. 2) to the cardholder 4. The cardholder 4 may be a person or entity whose identity needs to be securely verified. The user 6 may be an entity (e.g., the police, bank, etc.) that requires reliable identification of the cardholder 4.
 Upon the user's 6 request for a reliable form of identification, the cardholder 4 may present the ID card 8 issued by the issuer 2. The user 6 may then verify the information on the ID card 8 and determine if the ID card 8 belongs to the cardholder 4. This may eliminate the need for the user 6 to perform the background check verification procedure or even to contact the issuer 2 to verify an identification of the cardholder 4.
FIG. 2 shows an exemplary embodiment of the ID card 8 according to the present invention. The ID card 8 may be a driver license issued by a local Department of Motor Vehicles (“DMV”), a passport issued by the State Department, etc. The ID card 8 may have a front portion 10 and a back portion 20. The front portion 10 may include a photo 12, an ID number 14, personal information 16, a signature 18, etc. The front portion 10 may also include biometric identifiers such as a fingerprint, an iris scan, etc.
 The back portion 20 of the ID card 8 may contain certain data stored in a format that may be reliably captured by an ID card scanner/reading arrangement. In the preferred embodiment, the data is stored in a two-dimensional (“2D”) bar code 30. The data encoded in the 2D bar code 30 may include the data shown on the front portion 10. In addition, the data may include certain information that allows for the verification of the ID card 8 (e.g., characteristic digital data “CDD” of the photo 12). The bar code 30 may be combined with another barcode, if any, which may be already placed on the back portion 20. Those skilled in the art would also understand that the bar code 30 along with any other information situated on the back portion 20 may be situated on the front portion 10.
FIG. 3a shows an exemplary embodiment of a scanned image of the photo 12 subdivided into pixel groups to create the CDD (this subdivision is imaginary and is not actually drawn). A center portion of the image may be split into a regularly-spaced grid of pixel groups 40. For example, the grid may be 16 columns by 24 rows of the pixel groups 40. The number of the pixel groups 40 may be a function of the ideal size of the CDD and the number of bits needed to classify the pixel group 40. The edges of the image may contain border area 42 that are not included in the pixel groups 40.
 The border area 42 may contain a prearranged pattern. In the preferred embodiment, the pattern includes lines of different and distinct thickness and luminance. These lines allow the scanning arrangement to self-calibrate (i) alignment and (ii) response to luminance when scanning the ID card 8. This prearranged pattern may also convey information about the size of the pixel group grid, the location of columns and rows within the grid, etc.
FIG. 3b shows an exemplary embodiment of the pixel group 40 subdivided into a plurality of pixels. For example, the pixel group 40 may be a square shape and contain a grid of 18 by 18 pixels 46. The size of the pixel group 40 may be a function of the size of the photo 12, the number of pixel groups 40 and a density of (dots per inch) of printed images.
 Certain factors may be considered when determining the number of pixel groups 40 as it affects the size of the pixel group 40. For example, slight misalignments in scanning may have less of an effect when the pixel group 40 is large. On the other hand, if the size of the pixel group 40 increases, then the CDDs of two different photos may become less unique. Therefore, optimization of the number of the pixel groups 40 for a particular application may be necessary.
FIG. 4 shows an exemplary embodiment of a method according to the present invention. In Step 100, the photo 12 is scanned, using the arrangement, to generate a digital image representation of the photo 12. The arrangement processes the digital representation by dividing it into a predetermined number of the pixel groups 40. A number of pixels 46 of the pixel group 40 depends on a resolution of the arrangement. The arrangement may have a resolution of 300 pixels per inch, or 135,000 pixels in 1 inch by 1.5 inches, which may be a typical size for the photo 12. Some arrangements may represent each pixel 46 as an eight-bit gray value and other arrangement may represent each pixel with three 8-bit numbers representing the amount of red, green and blue for a total of 24 bits.
 In Step 110, a subset of the characteristic data for each pixel 46 is extracted. For example, if the image is a color image, using the values red, green and blue, a characteristic brightness or luminance of the pixel 46 may be determined by the following equation:
 However, if the image is a monochrome gray scale, then the characteristic data of pixels is the digitized value for that pixel.
 One skilled in the art understands that other characteristic values of the pixel 46 may be used (e.g., the value of a single color). Furthermore, one skilled in the art understands that the number of bits representing the values depends upon the sophistication of the arrangement.
 In Step 120, each pixel group 40 is classified into a number of predetermined subsets. The number of subsets may be determined as a function of the number of bits that may be used to represent the pixel group 40. In the exemplary embodiment, the pixel group 40 may be allocated with two bits. In such case, as illustrated in Table A of FIG. 3c, the pixel group 40 may be classified into four subsets: 0, 1, 2, 3. Those skilled in the art will understand that three or more bits per pixel group 40 may be utilized. An average pixel group characteristic data for a particular pixel group is determined as an average of all pixel characteristic data in that pixel group 40. If the allowed range of individual pixel value is between 0 and 255 and the average pixel group classification is, for example, between 0 and 63, then the pixel group 40 is given a classification of 0.
 In Step 130, the CDD is determined as a function of the pixel classification characteristic data and location of the corresponding pixel group 40 in the photo 12. For example, the CDD may be stored as a bit string where left-to-right row-by-row pixel classification data starts from an uppermost row of the photo 12.
FIG. 5 shows an exemplary method according to the present invention for generating the ID card 8. Initially, the issuer 2 obtains necessary information about cardholder 4 (e.g., data shown on the front portion 10). In Step 140, the issuer 2 generates the CDD as a function of the photo 12 by utilizing the method described above and shown in FIG. 4.
 In Step 150, the issuer 2 generates the ID card 8 which includes the CDD. In particular, the issuer 2 may combine the generated CDD with other data (e.g., the ID number 14, the personal information 16, etc.) to create a single data file. The issuer 2 may then digitally secure the file using one of conventional digital signature technologies (e.g., RSA digital signature and Digital Signature Algorithm (DSA), etc.).
 In the exemplary embodiment of the present invention, the file may be stored in the form of the 2D bar code 30. Those skilled in the art understand that the file with the CDD may be stored on the ID card 8 utilizing other data storage formats (e.g., an embedded chip in a “smart” card). Once the ID card 8 is generated, it is forwarded to the cardholder 4.
FIG. 6 shows an exemplary embodiment of a method according to the present invention for verifying the identity of the cardholder 4 using the ID card 8. In particular, the cardholder 4 needs to be verified for the user 6. The cardholder 4 presents the ID card 8 to the user 6. In Step 160, the user 6 scans/reads the CDD which is stored in the ID card 8 using the arrangement. The arrangement decodes the file stored on the ID card 8, decrypts it (if the file was originally encrypted) and then extracts the stored CDD.
 In Step 170, a further CDD is generated from the photo 12. This step is performed utilizing the method described above and shown in FIG. 4. In particular, the arrangement, as previously mentioned, scans the photo 12 and utilizes the border pixel pattern to self-calibrate and ensures reliable results. The further CDD is generated as described above.
 In Step 180, the stored CDD and the further CDD are compared to verify the authenticity of the photo 12. Due to imperfections in the scanning process and wear and tear on the ID card 8, a perfect match between the CDDs may not always be expected. The user 6 may, therefore, set a predetermined threshold of similarity between the CDDs for verification of the cardholder 4. For example, the user 6 may decide the CDDs must be substantially similar (e.g., above 80%); but in particular cases, they must be 96% identical, etc.
 The arrangement may employ a matching algorithm that applies more weight to severe mismatches (e.g., a difference of two levels of luminance is a graver mismatch than one level luminance). The algorithm may also attach a greater weight to the matches and mismatches toward the center of the photo 12 or where there is likely to exist more unique features within the photo 12. In addition, finding two-dimensional matches or mismatches in luminance changes across a boundary that extends along multiple groups (e.g., changes of luminance between groups) may be strongly weighted by the algorithm.
 There are many modifications to the present invention that will be apparent to those skilled in the art without departing from the teaching of the present invention. The embodiments disclosed herein are for illustrative purposes only and are not intended to describe the bounds of the present invention which is to be limited only by the scope of the claims appended hereto.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US2151733||May 4, 1936||Mar 28, 1939||American Box Board Co||Container|
|CH283612A *||Title not available|
|FR1392029A *||Title not available|
|FR2166276A1 *||Title not available|
|GB533718A||Title not available|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7516895 *||Jul 28, 2005||Apr 14, 2009||Annapolis Technologies, Llc||Bar code synchronization process for scanning image containing documents|
|US7624928||Nov 18, 2005||Dec 1, 2009||Fuji Xerox Co., Ltd.||Method and apparatus for making tags, tag, and system for managing articles|
|US7761453||Mar 2, 2007||Jul 20, 2010||Honeywell International Inc.||Method and system for indexing and searching an iris image database|
|US7933507||Mar 2, 2007||Apr 26, 2011||Honeywell International Inc.||Single lens splitter camera|
|US8045764||Mar 2, 2007||Oct 25, 2011||Honeywell International Inc.||Expedient encoding system|
|US8049812||Mar 2, 2007||Nov 1, 2011||Honeywell International Inc.||Camera with auto focus capability|
|US8050463||Mar 2, 2007||Nov 1, 2011||Honeywell International Inc.||Iris recognition system having image quality metrics|
|US8063889||Apr 25, 2007||Nov 22, 2011||Honeywell International Inc.||Biometric data collection system|
|US8064647||May 9, 2006||Nov 22, 2011||Honeywell International Inc.||System for iris detection tracking and recognition at a distance|
|US8085993||Mar 2, 2007||Dec 27, 2011||Honeywell International Inc.||Modular biometrics collection system architecture|
|US8090157||Feb 7, 2007||Jan 3, 2012||Honeywell International Inc.||Approaches and apparatus for eye detection in a digital image|
|US8090246||Aug 8, 2008||Jan 3, 2012||Honeywell International Inc.||Image acquisition system|
|US8098901||Feb 15, 2007||Jan 17, 2012||Honeywell International Inc.||Standoff iris recognition system|
|US8171567 *||May 1, 2012||Tracer Detection Technology Corp.||Authentication method and system|
|US8213782||Aug 7, 2008||Jul 3, 2012||Honeywell International Inc.||Predictive autofocusing system|
|US8280119||Dec 5, 2008||Oct 2, 2012||Honeywell International Inc.||Iris recognition system using quality metrics|
|US8300815||Sep 28, 2005||Oct 30, 2012||Gemalto Sa||Process to secure a personal portable object|
|US8442276||Mar 10, 2006||May 14, 2013||Honeywell International Inc.||Invariant radial iris segmentation|
|US8488846||Sep 30, 2011||Jul 16, 2013||Honeywell International Inc.||Expedient encoding system|
|US8538067||Sep 12, 2012||Sep 17, 2013||Gemalto Sa||Process to secure a personal portable object|
|US8595503 *||Jun 30, 2008||Nov 26, 2013||Konica Minolta Laboratory U.S.A., Inc.||Method of self-authenticating a document while preserving critical content in authentication data|
|US8705808||Mar 2, 2007||Apr 22, 2014||Honeywell International Inc.||Combined face and iris recognition system|
|US8886946 *||Apr 30, 2012||Nov 11, 2014||Copilot Ventures Fund Iii Llc||Authentication method and system|
|US9036913||Nov 28, 2008||May 19, 2015||Gemalto Sa||Secured identification medium and method for securing such a medium|
|US20050273356 *||Jul 28, 2005||Dec 8, 2005||Holoubek Michael J||Bar code synchronization process for scanning image containing documents|
|US20090003601 *||Jun 25, 2008||Jan 1, 2009||Canon Kabushiki Kaisha||Alpha-masked image matching|
|US20090328143 *||Jun 30, 2008||Dec 31, 2009||Konica Minolta Systems Laboratory, Inc.||Method of self-authenticating a document while preserving critical content in authentication data|
|EP1586463A2 *||Sep 17, 2004||Oct 19, 2005||Hitachi, Ltd.||Recording method of reliability decision on printed matter|
|EP1653395A2 *||Oct 1, 2004||May 3, 2006||Axalto SA||Protection method for a portable personal object|
|EP1791079A1 *||Nov 25, 2005||May 30, 2007||Fuji Xerox Co., Ltd.||Method and apparatus for making tags, tag, and system for managing articles|
|EP2073175A1 *||Dec 17, 2007||Jun 24, 2009||Gemalto SA||Secure identification medium and method of securing such a medium|
|WO2006038075A1 *||Sep 28, 2005||Apr 13, 2006||Axalto Sa||Method for making secure a personal portable object|
|WO2009077305A1 *||Nov 28, 2008||Jun 25, 2009||Gemalto Sa||Secured identification medium and method for securing such a medium|
|U.S. Classification||382/100, 382/232|
|International Classification||G06K9/00, G06K19/14, G07D7/20|
|Cooperative Classification||G06K19/14, G07D7/0033, G06K9/00221, G07D7/2033|
|European Classification||G06K9/00F, G06K19/14, G07D7/00B8, G07D7/20F2|
|Mar 17, 2003||AS||Assignment|
Owner name: SYMBOL TECHNOLOGIES, INC., NEW YORK
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SCHUESSLER, FREDERICK;REEL/FRAME:013859/0368
Effective date: 20030307
|Sep 22, 2010||FPAY||Fee payment|
Year of fee payment: 4
|Sep 24, 2014||FPAY||Fee payment|
Year of fee payment: 8
|Oct 31, 2014||AS||Assignment|
Owner name: MORGAN STANLEY SENIOR FUNDING, INC. AS THE COLLATE
Free format text: SECURITY AGREEMENT;ASSIGNORS:ZIH CORP.;LASER BAND, LLC;ZEBRA ENTERPRISE SOLUTIONS CORP.;AND OTHERS;REEL/FRAME:034114/0270
Effective date: 20141027
|Jul 8, 2015||AS||Assignment|
Owner name: SYMBOL TECHNOLOGIES, LLC, NEW YORK
Free format text: CHANGE OF NAME;ASSIGNOR:SYMBOL TECHNOLOGIES, INC.;REEL/FRAME:036083/0640
Effective date: 20150410
|Aug 17, 2015||AS||Assignment|
Owner name: SYMBOL TECHNOLOGIES, INC., NEW YORK
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:036371/0738
Effective date: 20150721